Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
1b8c7ae5a13b10631f19f3a2f6860e77749739b596aa87c54b3fd0aa43578549.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1b8c7ae5a13b10631f19f3a2f6860e77749739b596aa87c54b3fd0aa43578549.exe
Resource
win10v2004-20240426-en
General
-
Target
1b8c7ae5a13b10631f19f3a2f6860e77749739b596aa87c54b3fd0aa43578549.exe
-
Size
344KB
-
MD5
4594ff00611c357d3694def60f132815
-
SHA1
61c38540623b2dc7f75cc463831681b2a01c19d2
-
SHA256
1b8c7ae5a13b10631f19f3a2f6860e77749739b596aa87c54b3fd0aa43578549
-
SHA512
92f898b2eed0fc65e9e3037e07db836de4864e1a12afccd0e18f136019fdabe1a0a753843c94e71a3f565226245a2d7706590671d5aef4b3f913bdad90c3966c
-
SSDEEP
6144:jOtqhWEEfruHmDbayfVeJJ1pHlI2a4h3MgP10P1WsBConRyfcSoJs/L:atqhcTZ1fVSJbHlK4hcgP1QWRoRyf6
Malware Config
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Rule to detect Lockbit 3.0 ransomware Windows payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2268-7-0x0000000000400000-0x0000000000442000-memory.dmp family_lockbit behavioral1/memory/2268-5-0x0000000000400000-0x0000000000442000-memory.dmp family_lockbit behavioral1/memory/2268-8-0x0000000000400000-0x0000000000442000-memory.dmp family_lockbit behavioral1/memory/2268-9-0x0000000000400000-0x0000000000442000-memory.dmp family_lockbit behavioral1/memory/2268-3-0x0000000000400000-0x0000000000442000-memory.dmp family_lockbit -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2728 2268 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
1b8c7ae5a13b10631f19f3a2f6860e77749739b596aa87c54b3fd0aa43578549.exedescription pid Process procid_target PID 2268 wrote to memory of 2728 2268 1b8c7ae5a13b10631f19f3a2f6860e77749739b596aa87c54b3fd0aa43578549.exe 28 PID 2268 wrote to memory of 2728 2268 1b8c7ae5a13b10631f19f3a2f6860e77749739b596aa87c54b3fd0aa43578549.exe 28 PID 2268 wrote to memory of 2728 2268 1b8c7ae5a13b10631f19f3a2f6860e77749739b596aa87c54b3fd0aa43578549.exe 28 PID 2268 wrote to memory of 2728 2268 1b8c7ae5a13b10631f19f3a2f6860e77749739b596aa87c54b3fd0aa43578549.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b8c7ae5a13b10631f19f3a2f6860e77749739b596aa87c54b3fd0aa43578549.exe"C:\Users\Admin\AppData\Local\Temp\1b8c7ae5a13b10631f19f3a2f6860e77749739b596aa87c54b3fd0aa43578549.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 1002⤵
- Program crash
PID:2728
-